Publikationen

Publikationen

The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem
Schläpfer, Michael; Volkamer, Melanie
Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, p.410-418
[Conference Proceedings]


Malacoda: towards high-level compilation of network security applications on reconfigurable hardware
Mühlbach, Sascha; Koch, Andreas
Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems, p.247-258
[Conference Proceedings]


Secure Two-Party Computations in ANSI C
Holzer, Andreas; Franz, Martin; Katzenbeisser, Stefan; Veith, Helmut
Conference on Computer and Communications Security (CCS 2012), p.772-783
[Conference Proceedings]


iPIN and mTAN for secure eID applications
Braun, Johannes; Horsch, Moritz; Wiesmaier, Alexander
8th International Conference on Information Security Practice and Experience (ISPEC 2012), p.259-276
[Conference Proceedings]


Cleaning up the PKI for Long-term Signatures
Vigil, Martín; Custódio, Ricardo Felipe
12th SBSeg 2012, Brazilian Symposium on Information and Computer System Security, p.140-153
[Conference Proceedings]


Smart Home Dashboard – Das intelligente Energiemanagement
Stopczynski, Martin; Ghiglieri, Marco
VDE KONGRESS 2012 Smart Grid
[Conference Proceedings]


Privacy-Preserving Architecture for Forensic Image Recognition
Peter, Andreas; Hartmann, T.; Müller, S.; Katzenbeisser, Stefan
International Workshop on Information Forensics and Security (WIFS 2012), p.79-84
[Conference Proceedings]


Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication
Davi, Lucas; Dmitrienko, Alexandra; Liebchen, Christopher; Sadeghi, Ahmad-Reza
BlackHat Abu Dhabi
[Conference Proceedings]


Towards a Trust Management System for Cloud Computing
Habib, Sheikh Mahbub; Ries, Sebastian; Mühlhäuser, Max
Proceedings: The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, p.933-939
[Conference Proceedings]


An efficient mobile PACE implementation
Wiesmaier, A.; Horsch, M.; Braun, J.; Kiefer, F.; Hühnlein, D.; Strenzke, F.; Buchmann, J.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, p.176-185
[Conference Proceedings]


Mobile Authentisierung und Signatur
Braun, J.; Horsch, M.; Wiesmaier, A.; Hühnlein, D.
D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, p.32-43
[Conference Proceedings]


AmazonIA: When Elasticity Snaps Back
Bugiel, Sven; Pöppelmann, Thomas; Nürnberger, Stefan; Sadeghi, Ahmad-Reza; Schneider, Thomas
CCS '11: Proceedings of the 18th ACM conference on Computer and communications security, p.389-400
[Conference Proceedings]


Towards a Trust Management System for Cloud Computing
Habib, Sheikh Mahbub; Ries, Sebastian; Mühlhäuser, Max
IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
[Conference Proceedings]


Towards a mobile eCard Client
Buchmann, J.; Wiesmaier, A.; Hühnlein, D.; Braun, J.; Horsch, M.; Kiefer, F.; Strenzke, F.
Tagungsband zum 13. KryptoTag, p.4
[Conference Proceedings]


Der Lifetime eSafe — ein sicheres elektronisches Schließfach
Langer, L.; Wiesmaier, A.
Abstract Book of the 8th European Conference on Digital Archiving (ECA 2010), p.155
[Conference Proceedings]


From Student Smartcard Applications to the German Electronic Identity Card
Langer, L.; Schmidt, A.; Wiesmaier, A.
9th European Conference on e-Government — ECEG, p.430-435
[Conference Proceedings]


A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data
Hühnlein, D.; Korte, U.; Langer, L.; Wiesmaier, A.
3rd International Conference on New Technologies, Mobility and Security (NTMS), p.1-5
[Conference Proceedings]


Intrinsically Legal-For-Trade Objects by Digital Signatures
Wiesmaier, A.; Rauchschwalbe, U.; Ludwig, C.; Henhapl, B.; Ruppert, M.; Buchmann, J.
Sicherheit 2006: Sicherheit — Schutz und Zuverlässigkeit, p.218-221
[Conference Proceedings]


An Electronic Scheme for the Farnel Paper-Based Voting Protocol
Araújo, R.; Custodio, R.; Wiesmaier, A.; Takagi, T.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06), p.78-91
[Conference Proceedings]


On Firewalls and Tunneling
Frommer, J.; Wiesmaier, A.; Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06), p.190-205
[Conference Proceedings]


On Securing Unix Systems with Smart Cards
große Osterhues, D.; Wiesmaier, A.; Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06), p.143-157
[Conference Proceedings]


The State of the Art in DNS Spoofing
Steinhoff, U.; Wiesmaier, A.; Araújo, R.
Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06)
[Conference Proceedings]


Towards Secure Electronic Workflows
Fritsch, S.; Karatsiolis, E.; Lippert, M.; Wiesmaier, A.; Buchmann, J.
Third European PKI Workshop: Theory and Practice (EuroPKI 2006), p.154-168
[Conference Proceedings]


Planning for Directory Services in Public Key Infrastructures
Karatsiolis, E.; Lippert, M.; Wiesmaier, A.
Sicherheit 2005, p.349-360
[Conference Proceedings]


Outflanking and Securely Using the PIN/TAN System
Wiesmaier, A.; Karatsiolis, E.; Lippert, M.; Buchmann, J.
2005 International Conference on Security and Management (SAM 05), p.313-319
[Conference Proceedings]


An Evaluated Certification Services System for the German National Root CA — Legally Binding and Trustworthy Transactions in E-Business and E-Government
Wiesmaier, A.; Lippert, M.; Karatsiolis, E.; Raptis, G.; Buchmann, J.
2005 International Conference on E-Business, Enterprise Information Systems, and Outsourcing (EEE 05), p.103-108
[Conference Proceedings]


The Workshop — Implementing Well Structured Enterprise Applications
Wiesmaier, A.; Karatsiolis, E.; Lippert, M.; Buchmann, J.
2005 International Conference on Software Engineering Research and Practice (SERP) 05, p.947-953
[Conference Proceedings]


Directory Based Registration in Public Key Infrastructures
Lippert, M.; Karatsiolis, E.; Wiesmaier, A.; Buchmann, J.
The 4th International Workshop for Applied PKI (IWAP 05), p.17-32
[Conference Proceedings]


Using LDAP Directories for Management of PKI Processes
Karatsiolis, E.; Lippert, M.; Wiesmaier, A.
Public Key Infrastructure: First European PKI Workshop: Research and Applications (EuroPKI 04), p.126-134
[Conference Proceedings]


The Key Authority — Secure Key Management in Hierarchical Public Key Infrastructures
Wiesmaier, A.; Lippert, M.; Karatsiolis, E.
International Conference on Security and Management (SAM 04), p.89-93
[Conference Proceedings]